IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 27 of 27 [Previous]  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
CAS, NLP 2009-01-23
14:55
Miyazaki   Network Visualization of Electronical Medical Record(IZANAMI) by Using Mining Technology
Muneo Kushima, Kenji Araki, Muneou Suzuki, Sanae Araki, Hiroki Tamura, Koichi Tanno, Takako Toyama, Okihiko Ishizuka (Unversity of Miyazaki), Mitsuru Ikeda (JAIST) CAS2008-97 NLP2008-127
It is an important research assignment of the medical information field to make an effective use of the treatment inform... [more] CAS2008-97 NLP2008-127
pp.187-192
IT, ISEC, WBS 2007-03-16
09:45
Gunma Gunma Univ. (Kiryu Campus) Key Update by Broadcast Encryption for Wireless Sensor Networks
Taketsugu Yao, Ryohei Konuma, Shigeru Fukunaga, Toshihisa Nakai (OKI)
We propose the key update scheme for multi-hop tree topology networks, which effectively update the network key by assig... [more] IT2006-96 ISEC2006-151 WBS2006-93
pp.65-70
ISEC 2006-09-13
16:10
Tokyo Kikai-Shinko-Kaikan Bldg. Key Predistribution Schemes for Sensor Networks Using Lines and Points over a Finite Geometry
Ritsuko Matsumoto, Hisashi Mouri, Yuichi Kaji (NAIST)
This study investigates new schemes for distributing cryptographic keys in sensor networks. Sharing a key is the very fi... [more] ISEC2006-85
pp.97-104
ISEC, SITE, IPSJ-CSEC 2006-07-21
13:00
Okayama Okayama Univ. Hierarchical Key Assignment for Efficient Public-Key Black-Box Tracing against Self-Defensive Pirates
Tatsuyuki Matsushita (Toshiba Corp.), Hideki Imai (Chuo Univ., AIST)
We propose a hierarchical key-assignment method by which the transmission overhead in a public-key black-box tracing sch... [more] ISEC2006-52
pp.91-98
ISEC, IPSJ-CSEC, SITE 2005-07-22
09:30
Iwate Iwate Prefectural University A Group Key Management Scheme for Secure Multicast Increasing Efficency in Leave Operation
Alireza Nemaney Pour, Kazuya Kumekawa, Toshihiko Kato, Shuichi Itoh (The Univ. of Electro-Communications)
This paper proposes an efficient model and the associated algorithm for the group key management in secure multicast. In... [more] ISEC2005-43
pp.1-8
PRMU, TL 2005-03-18
16:45
Akita   Construction of the Motion Database System whose Contents can be Searched by a Motion Name
Takashi Yukawa (Akita Keho Univ. Jr. Col.), Naoko Obara, Hideo Tamamoto (Akita Univ.)
In order to reuse the human motion data recorded by the motion capture system, we have proposed a motion database constr... [more] TL2004-96 PRMU2004-264
pp.193-197
IT, WBS, ISEC 2005-03-18
15:55
Kyoto Kyoto Univ. Variable Data-length Encryption Using Arithmetic Operations
Takeshi Tounai, Hisashi Suzuki (Chuo Univ)
This article proposes an algorithm which adaptive arithmetic coding is applied to for an encryption, which converts any ... [more] IT2004-87 ISEC2004-143 WBS2004-202
pp.89-94
 Results 21 - 27 of 27 [Previous]  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan